Administrator's Guide

Features and technical reference
555-233-5061462 Issue 5 October 2002
Authorization codes
Authorization codes prevent unauthorized access to various facilities. When a
user dials an authorization code, your system checks the code. If it is not valid, the
call is intercepted. If the code is valid, the system determines an associated COR
and FRL. If AFRL is activated, the AFRL level is used.
For example, a user whose FRL is 1 attempts a long-distance call. AFRL is active
and maps to AFRL 3. The desired trunk has an FRL of 7, and the call is blocked.
In the example below, an Authorization Code set to1234567 has a COR of 3 with
an FRL 5, which is still not high enough to access the desired trunk. However,
AFRL is active and FRL 5 maps to FRL 7. The call is allowed.
Figure 56. Example of authorization codes with AFRLs
3
0
3
7
6
5
4
3
2
1
AFRL FRL
COR to FRL Table Authorization code to COR Table
7
5
FRL to AFRL Table
3
1
4
3
2
1
FRL COR
3
3
2
3
COR
2222222
1234569
1234568
1234567
Authorization Code
Trunk Desired COR is 4
Originator COR is 1
7
7
7
7
3
3